Some websites contain indecent or obscene content and are clearly not suitable for children and young persons. There are software tools available that can help filter out websites that are not suitable for children, monitor your children's online activities, and limit the amount of time your child spends online.

When children go online, they face new dangers and need more protection. Examples of the risks are: privacy of software and music, disclosure of personal information, spyware, illegal downloads, spam emails and so on.

As parents, your children's rights and safety are your prime concern. Children should also be aware of the governing laws. Here are some dos and don'ts for you to take precautions and to guide your children who have access to computer connected to the Internet.

When Information Technology has become a school subject even in primary level in Hong Kong, teachers have to keep up with the latest knowledge so that you can provide guidance to students in the related area.

Users can enjoy the benefit of choosing one password to access multiple applications, instead of memorising many different passwords. However, compromise of one authentication event could result in the compromise of all resources that the user has access rights to.

Given that attackers are now moving away from attacks that are merely a nuisance or destructive towards activity that is motivated by financial gain, malicious code attacks have become more sophisticated and a significant concern to organisations.

Try to avoid visiting phishing websites that imitate sites of well-known organisations. These are purposely setup to collect sensitive information from visitors, such personal information, usernames and passwords, in a fraudulent manner. This type of activity is notorious, and is known as phishing.

Many computer and console video games can be played online against other players over the Internet. Players are allowed to communicate sometimes using text messages typed into the computer and sometimes using a microphone.

It is the responsibility of all of us to take charge of protecting our own information and data from attacks and computer related crimes. The following tips can help you stay aware of information security threats.

Encryption is a process for scrambling and transforming data from an easily readable and understandable format (such as Plain Text) into an unintelligible format that seems to be useless and not readily understandable (known as Cipher Text).

Before you make connection to the wireless Network, it is important to make sure that your device is being logically protected. A mobile device can connect to your wireless network wherever it is within range of the signal strength from your wireless router.

Free Wi-Fi facilities are available at various local and overseas public areas such as shopping malls, coffee shops, hotels, airports or government premises. Users should pay attention to the security risks when using Wi-Fi services.

Don't forget to implement necessary security measures when you set up your new PC at home. Just taking a new computer out of the box and connecting it to the Internet is not safe. You are exposing your PC to a number of security risks, such as virus and malicious codes infection, spam emails, denial of service attacks, disclosure of personal or sensitive information and so on.

From time to time, software bugs are discovered in applications running on your PC. Software vendors will then release one or more 'patches' to fix the weaknesses. At the same time, hackers can take advantage of these weaknesses to attack the unpatched PCs.

A public computer is any of the various types of computers available in public areas. In Hong Kong, places where public computers are available include libraries, cafes, restaurants or facilities run by the government. Many different people throughout the day use public computers, so using them poses certain security risks.

Malicious code refers to computer viruses, worms, spyware, Trojan Horses and other undesirable software. Attack made by using such software is to cause disruption either by deleting files, sending emails, or rendering the host system inoperable.

Identity theft is a criminal act of getting hold of personal data of others without their knowledge or permission with an intent to defraud. The personal data is used by identity thieves to impersonate the data subjects for fraudulent purposes.

Ransomware is a malicious software that cyber criminals used to lock the files stored on the infected computer devices. These locked files are like hostage and the victims are required to follow the instructions of this malicious software and pay a ransom to unlock them.

The use of computer, the Internet and telecommunication or information devices has brought us much convenience in all kinds of our daily pursuits, from learning, leisure, personal communication to conducting business activities. However, at the same time, the convenience of this virtual space has created a great potential for abuse by criminals.

As what our slogan emphasises: Information Security is Everybody's Business. How much do you know about Information Security and Computer Related Crime? Take the challenge of our "Quiz on InfoSec", and you will then know the answer.